Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

1086 results about "Data breach" patented technology

A data breach is the intentional or unintentional release of secure or private/confidential information to an untrusted environment. Other terms for this phenomenon include unintentional information disclosure, data leak, information leakage and also data spill. Incidents range from concerted attacks by black hats, or individuals who hack for some kind of personal gain, associated with organized crime, political activist or national governments to careless disposal of used computer equipment or data storage media and unhackable source.

Authentication system and working method thereof

The invention discloses an authentication system and a working method thereof and belongs to the information security field. The method includes the following steps that: when receiving an access request, a server generates a first challenge value and sends the first challenge value to a client; the client uses a preset Hash algorithm to carry out Hash calculation on the first challenge value to generate a challenge Hash value; when judging that a received identification code is matched with a pairing code stored in an identity authentication module, the identity authentication module uses a private key corresponding to the pairing code to calculate the challenge the Hash value according to a preset signature algorithm so as to obtain a signature value; the client generates a signature verification request according to the signature value and sends the signature verification request to the server; and the server authenticates the signature verification request, and a user is allowed to access requested resources if the authentication is successful, and the user is not allowed to access the requested resources if the verification fails. With the authentication system and the working method thereof provided by the technical schemes of the invention adopted, communication can be continued as long as the identity authentication module completes local authentication, and therefore, the problem of data leakage in a data transmission process can be prevented, and the security of the communication can be improved.
Owner:FEITIAN TECHNOLOGIES

Method for offline detecting private data leakage of Android application program

The invention discloses a method for offline detecting private data leakage of an Android application program. The method comprises the following steps that private data are defined; an Android system based on dynamic dirty point detection is customized, and corresponding dirty point labels are added to the private data of different types; an APK to be detected in user side equipment is guided into a computer; the system is operated on a simulator, and the application program in the APK to be detected is installed and operated; controls in the application program are automatically traversed and clicked by automatically testing scripts, corresponding behaviors are triggered, and the dangerous behavior of the detected application program are recorded; after traversal is finished, the private data leakage detection report of the detected APK is generated. The problems that the private data leakage can only be reminded in real time, a record detection result is not generated, and virtual detection and leak detection occur easily are solved, and meanwhile the problems that an existing detection scheme is low in test efficiency and poor in practicality, the real private data leakage can be caused, and the risk is large are solved.
Owner:SOUTHEAST UNIV

Online contract signing system and online contract signing method on basis of block chain technologies

The invention provides an online contract signing system and an online contract signing method on the basis of block chain technologies. The online contract signing method includes allowing contract initiators to log in systems; creating electronic contracts; carrying out encrypting and distributing, to be more specific, encrypting the electronic contracts by network engines of clients and then distributing the electronic contracts to clients of various contract signatories; decrypting contract contents by the related contract signatories and viewing the contract contents; selecting signing modes; carrying out encrypting and distributing; storing encrypted contract secret keys by non-contract-signing related parties so that anonymous encrypted unidentifiable contract data on networks can be synchronized after each client logs in the systems. The online contract signing system and the online contract signing method have the advantages that decentralization strategies are completely adopted, all operation is locally carried out, and accordingly the possibility that data leak to third parties can be prevented; anonymous encryption strategies are adopted for contract data, accordingly,encrypted data contents cannot be identified by clients of the non-contract-signing related parties, all global clients need to be tampered by optional protocol tampering operation, no optional client has the permission for operating data of the other clients, and the tampering possibility can be completely eradicated.
Owner:才信网络科技(上海)有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products